Skip to main content

Apple QuickTime Multiple Vulnerabilities

Last Update Date: 9 Nov 2012 11:26 Release Date: 9 Nov 2012 4868 Views

RISK: High Risk

TYPE: Clients - Audio & Video

TYPE: Audio & Video

Multiple vulnerabilities have been identified in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

  1. A boundary error when processing a PICT file can be exploited to cause a buffer overflow.
  2. An error when processing a PICT file can be exploited to corrupt memory.
  3. A use-after-free error exists in the plugin when handling "_qtactivex_" parameters within an HTML object.
  4. A boundary error when handling the transform attribute of "text3GTrack" elements can be exploited to cause a buffer overflow via a specially crafted TeXML file.
  5. Some errors when processing TeXML files can be exploited to cause a buffer overflows.
  6. A boundary error when handling certain MIME types within a plugin can be exploited to cause a buffer overflow.
  7. A use-after-free error exists in the ActiveX control when handling "Clear()" method.
  8. A boundary error when processing a Targa file can be exploited to cause a buffer overflow.
  9. A boundary error when processing the "rnet" box within MP4 files can be exploited to cause a buffer overflow.

Impact

  • Remote Code Execution

System / Technologies affected

  • Apple QuickTime 7.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 7.7.3.

Vulnerability Identifier


Source


Related Link